Network Jamming: Distributed Performance using Generative Music
نویسنده
چکیده
Generative music systems can be played by musicians who manipulate the values of algorithmic parameters, and their datacentric nature provides an opportunity for coordinated interaction amongst a group of systems linked over IP networks; a practice we call Network Jamming. This paper outlines the characteristics of this networked performance practice and discusses the types of mediated musical relationships and ensemble configurations that can arise. We have developed and tested the jam2jam network jamming software over recent years. We describe this system, draw from our experiences with it, and use it to illustrate some characteristics of Network Jamming.
منابع مشابه
MuseGAN
Generating music has a few notable differences from generating images and videos. First, music is an art of time, necessitating a temporal model. Second, music is usually composed of multiple instruments/tracks, with close interaction with one another. Each track has its own temporal dynamics, but collectively they unfold over time interdependently. Lastly, for symbolic domain music generation,...
متن کاملPerformance Study of Untrusted Relay Network Utilizing Cooperative Jammer
Abstract—In this paper, the problem of secure transmission in two-hop amplify-and-forward (AF) systems with an untrusted relay is investigated. To prevent the untrusted relay from intercepting the source message and to achieve positive secrecy rate, the destination-based cooperative jamming (DBCJ) technique is used. In this method the destination sends an intended jamming signal to the relay. T...
متن کاملInfrared Counter-Countermeasure Efficient Techniques using Neural Network, Fuzzy System and Kalman Filter
This paper presents design and implementation of three new Infrared Counter-Countermeasure (IRCCM) efficient methods using Neural Network (NN), Fuzzy System (FS), and Kalman Filter (KF). The proposed algorithms estimate tracking error or correction signal when jamming occurs. An experimental test setup is designed and implemented for performance evaluation of the proposed methods. The methods v...
متن کاملJointly Effective Optimal Flow Control and Multi-path Routing for Wireless Networks under Probabilistic Attacks
A wireless network is vulnerable to jamming attacks since the network relies on open and shared wireless channels. Maintaining an acceptable level of network performance degradation has been an important problem in the wireless network. This paper studies a scheme for network performance optimization by exploiting dynamic rate control and multi-path routing in the wireless network under probabi...
متن کاملA Real Time Common Chord Progression Guide on the Smartphone for Jamming Pop Song on the Music Keyboard
Pop music jamming on the keyboard requires massive music knowledge. Musician needs to understand and memorize the behavior of each chord in different keys. However, most simple pop music follows a common chord progression pattern. This pattern applies to most simple pop music on all the 12 keys. We designed an app that can reduce the difficulty of music jamming on the keyboard by using this pat...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2010